An Introduction To Wireless Technologies - Unibz

1y ago
4 Views
1 Downloads
2.76 MB
50 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Nadine Tse
Transcription

An Introduction to Wireless Technologies Part 2 F. Ricci 2010/2011

Content Multiplexing Medium access control Medium access control (MAC): FDMA Frequency Division Multiple Access TDMA Time Division Multiple Access CDMA Code Division Multiple Access Cellular systems GSM architecture GSM MAC Sequence diagram of a phone call GPRS Most of the slides of this lecture come from prof. Jochen Schiller’s didactical material for the book “Mobile Communications”, Addison Wesley, 2003.

Multiplexing Multiplexing describes how several users can share a medium with minimum or no interference Example: lanes in a highway Cars in different lanes (space division multiplexing) Cars in a line but at different times (time division multiplexing) Multiplexing in 4 dimensions space (s) time (t) frequency (f) code (c) Important: guard spaces needed!

Space Division Multiplexing (SDM) Different channels for communications are allocated to different spaces With this space only three channels can be separated Example 1: each subscriber of an analogue telephone system is given a different wire Example 2: FM stations can transmit only in a certain region SDM is the simplest and inefficient Usually associated with other methods. channels ki k1 k2 k3 k4 k5 k6 c t c t s1 f f s2 c t s3 f

Frequency Multiplex Separation of the whole spectrum into smaller frequency bands A channel gets a certain band of the spectrum for the whole time Advantages: no dynamic coordination necessary k1 k2 k3 k4 k5 k6 works also for analog signals c Disadvantages: waste of bandwidth if the traffic is distributed unevenly inflexible guard spaces t f

Time Multiplex A channel gets the whole spectrum for a certain amount of time Advantages: only one carrier in the medium at any time throughput high even for many users k1 k2 k3 k5 k6 c t k4 Disadvantages: Precise synchronization necessary (clocks) Guard space f

Time and Frequency Multiplex Combination of both methods A channel gets a certain frequency band for a certain amount of time k1 k2 k3 k4 k5 k6 c f t Advantages: better protection against tapping protection against frequency selective interference higher data rates compared to code multiplex but: precise coordination required

Code Multiplex Each channel has a unique code: a vector of 1 and -1, k1 These vectors are orthogonal and have a large autocorrelation (norm of the vector) All channels use the same spectrum at the same time Advantages: bandwidth efficient no coordination and synchronization necessary good protection against interference and tapping Disadvantages: lower user data rates more complex signal regeneration. k2 k3 k4 k5 k6 c f t

Medium Access Control Medium access control comprises all mechanisms that regulate user access to a medium using SDM, TDM, FDM or CDM MAC is a sort of traffic regulation (as traffic lights in road traffic) MAC belongs to layer 2 (OSI Model): data link control layer The most important methods are TDM TDM is convenient because the systems stay tuned on a given frequency and the us the frequency only for a certain amount of time (GSM)

Motivation for a Medium Access Control Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks signal strength decreases proportional to the square of the distance the sender would apply CS and CD, but the collisions happen at the receiver it might be the case that a sender cannot “hear” the collision, i.e., CD does not work furthermore, CS might not work if, e.g., a terminal is “hidden” (too far to be heard).

Motivation - hidden and exposed terminals Hidden terminals: the medium seems free and collisions are not detected A sends to B, C cannot receive A C wants to send to B, C senses a “free” medium (CS fails) and transmits collision at B, C cannot receive the collision (CD fails) A is “hidden” for C (and C is hidden for A) A B C D Exposed terminals: the medium seems in use but this will not cause a collision B sends to A, C wants to send to D C has to wait, CS signals a medium in use but D is outside the radio range of B, therefore waiting is not necessary C is “exposed” to B

Motivation - near and far terminals Terminals A and B send, C receives signal strength decreases proportional to the square of the distance the signal of terminal B therefore drowns out A’s signal C cannot receive A A B C If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer

Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) segment space into sectors, use directed antennas cell structure FDMA (Frequency Division Multiple Access) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) TDMA (Time Division Multiple Access) assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time.

Cell structure segmentation of the area into cells possible radio coverage of the cell cell idealized shape of the cell use of several carrier frequencies not the same frequency in adjoining cells cell sizes vary from some 100 m up to 35 km depending on user density, geography, transceiver power etc. hexagonal shape of cells is idealized (cells overlap, shapes depend on geography) if a mobile user changes cells then handover of the connection to the neighbor cell.

Cell structure Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Advantages of cell structure: higher capacity, higher number of users less transmission power needed more robust, decentralized base station deals with interference, transmission area etc. locally Problems: fixed network needed for the base stations handover (changing from one cell to another) necessary interference with other cells requires frequency planning

Fixed TDM - example DECT Only one frequency is used Each partner must be able to access the medium for a time slot at the right moment The base station uses 12 slots for downlink and the mobile uses other 12 slots for uplink Up to 12 different mobile stations can use the same frequency Every 10ms 417µs*24 a mobile station can access the medium Very inefficient for bursty data This wastes a lot of bandwidth 417 µs 1 2 3 downlink 11 12 1 2 3 uplink 11 12 t

DECT properties Audio codec: G.726 Net bit rate: 32 kbit/s Frequency: 1880 MHz–1900 MHz in Europe, 1900 MHz-1920 MHz in China, 1910 MHz-1930 MHz in Latin America and 1920 MHz–1930 MHz in the US and Canada Carriers: 10 (1,728 kHz spacing) in Europe, 5 (1,728 kHz spacing) in the US Time slots: 2 x 12 (up and down stream) Channel allocation: dynamic Average transmission power: 10 mW (250 mW peak) in Europe, 4 mW (100 mW peak) in the US.

Aloha (“hello” in Hawaiian language) Mechanism: random, distributed (no central arbiter), time-multiplex If a collision occurs the transmitted data is destroyed – the problem is resolved at a higher level (data is retransmitted) Works fine for a light load and if the data packets arrive in a random way collision sender A sender B sender C t

Slotted Aloha All senders are synchronized, transmission can only start at the beginning of a time slot Still access is not coordinated The throughput pass from 18% (Aloha) to 36% It is used for the initial connection set up in GSM collision sender A sender B sender C t

FDD/FDMA - example GSM FDD Frequency division duplex Both partners have to know the frequency in advance The base station allocates the frequencies downlink 960 MHz 960.2 MHz 935.2 MHz f 124 200 kHz 1 20 MHz 915 MHz 124 uplink 890.2 MHz 1 t full-duplex means that you use one frequency for talking and a second, separate frequency for listening. Both people on the call can talk at once. CB radios are half-duplex devices – only one can talk

GSM - TDMA/FDMA 935-960 MHz 124 channels (200 kHz) downlink 890-915 MHz 124 channels (200 kHz) uplink higher GSM frame structures time GSM TDMA frame 1 2 3 4 5 6 7 8 4.615 ms GSM time-slot (normal burst) guard space tail 3 bits user data S Training S user data 57 bits 1 26 bits 1 57 bits guard tail space 3 546.5 µs 577 µs 148 bits in 546.5µs 156.25 bits in 577 µs

Radio interface Each slot represents a physical channel: lasts for 577µs and contains (at most, filling the guard space) 156.25 bits, but is repeated every 4.615 ms Each physical channel can transmit 156.25/4.615ms 33.8Kbit/s Each radio carrier can transmit 33.8Kbit/s * 8 270Kbit/s In order to have more flexibility and allow channels to have a required bandwidth (e.g. less than 33.8Kbit/s) there are Logical Channels A logical channel can take less than a slot every eight slots.

Logical Channels The green sequence uses all the capacity of the physical channel The red sequence define a logical channel that uses half the capacity of a physical channel, only 16.9Kbit/s time

Traffic channel and control channels Traffic channels (TCH) are used to transmit user data Full-rate TCH (22.8Kbit/s) and half-rate TCH (11.4Kbit/ s) are the basic categories The codecs used for voice uses 13Kbit/s or 5.6Kbit/s Data can be transmitted with 4.8, 9.6 or 14.4Kbit/s Control channels (CCH) are used to control medium access, allocation of traffic, or mobility management Broadcast control channels: used by BTS (Base Transceiver Station) to signal info to all MS (e.g. cell identifier) Common control channel: for connection set up between MS and BS (paging to MS or MS try connection with BS) Dedicated control channel: for registration, authentication, exchange information about quality of signal.

Access method CDMA CDMA (Code Division Multiple Access) all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel each sender has a unique random code, the sender XORs the signal with this random code the receiver can “tune” into this signal if it knows the pseudo random code, tuning is done via a correlation function.

Scalar (or “inner”) product a (1, 0, 1, 1), b (1, -1, -1, 0) a·b 1*1 0*(-1) 1*(-1) 1*0 0 a·(b c) a·b a·c a·(kb) k a·b (k is a scalar) a 2 a·a If a and b are orthogonal, i.e., a·b 0, then a ·(ka hb) k a 2 b ·(ka hb) h b 2 See also http://en.wikipedia.org/wiki/Code-division multiple access

CDMA in theory Sender A Sends Ad 1, key Ak 010011 Assign in Ad and Ak: „0“ to -1, and „1“ to 1 Sending signal As Ad * Ak (-1, 1, -1, -1, 1, 1) ('*' XOR) Sender B Sends Bd 0, key Bk 110101 Assign in Bd and Bk: „0“ to -1, and „1“ to 1 Sending signal Bs Bd * Bk (-1, -1, 1, -1, 1, -1) Both signals superimpose in space interference neglected (noise etc.) – and assuming that signals arrive with the same strength As Bs (-2, 0, 0, -2, 2, 0) Receiver wants to receive signal from sender A and B Apply key Ak bitwise (inner product) Ae (-2, 0, 0, -2, 2, 0) Ak 2 0 0 2 2 0 6 result greater than 0, therefore, original bit was „1“ Receiving B Be (-2, 0, 0, -2, 2, 0) Bk -2 0 0 - 2 - 2 0 -6, i.e. „0“

Interpretation Ak 010011 is represented with the chip code (-1, 1, -1, -1, 1, 1) VA Bk 110101 is represented with the chip code (1, 1, -1, 1,- 1, 1) VB VA ·VB 0, i.e., they are orthogonal If A want to transmit h and B want to transmit k (h and k are either 1 or -1, encoding a '1' or a '0') Then h VA and k VB are transmitted and h VA k VB is received Decoding message sent by A: VA ·(h VA k VB) h VA 2 Decoding message sent by B: VB ·(h VA k VB) k Vb 2 Hence you can understand that A sent a h and B sent k.

CDMA – Advantages vs. Disadvantages Disadvantages: higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) all signals should have the same strength at a receiver Advantages: all terminals can use the same frequency, no planning needed huge code space compared to frequency space forward error correction and encryption can be easily integrated.

GSM: Mobile Services GSM offers several types of connections: voice connections, data connections, short message service multi-service options (combination of basic services) Three service domains Bearer Services: transfer data between access points Telematic Services: voice and communication between phones Supplementary Services: voice mailbox, fax, SMS, mail.

Ingredients 1: Mobile Phones, PDAs & Co. The visible but smallest part of the network!

Ingredients 2: Antennas Still visible – cause many discussions

Ingredients 3: Infrastructure 1 Base Stations Cabling Microwave links

Ingredients 3: Infrastructure 2 Not „visible“, but comprise the major part of the network (also from an investment point of view ) Management Data bases Switching units Monitoring

GSM Architecture CELL TRANSMITTER & RECEIVER INTERFACE TO LAND TELEPHONE NETWORKS HIERARCHY OF CELLS PHONE STOLEN, BROKEN CELLPHONE LIST ENCRYPTION, AUTHENTICATION SIM: IDENTIFIES A SUBSCRIBER LIST OF ROAMING VISITORS LIST OF SUBSCRIBERS IN THIS AREA SOURCE: UWC

Architecture of the GSM system GSM is a PLMN (Public Land Mobile Network) several providers setup mobile networks following the GSM standard within each country components MS (mobile station) BS (base station) MSC (mobile switching center) LR (location register) subsystems RSS (radio subsystem): covers all radio aspects NSS (network and switching subsystem): call forwarding, handover, switching OSS (operation subsystem): management of the network

Radio subsystem The Radio Subsystem (RSS) comprises the cellular mobile network up to the switching centers Components Base Station Subsystem (BSS): Base Transceiver Station (BTS): radio components including sender, receiver, antenna - if directed antennas are used one BTS can cover several cells Base Station Controller (BSC): switching between BTSs, controlling BTSs, managing of network resources, mapping of radio channels onto terrestrial channels Typically 10 to 100 BTS for a BSC BSS BSC sum(BTS) interconnection Mobile Stations (MS)

Base Transceiver Station and Controller Tasks of a BSS are distributed over BSC and BTS BTS comprises radio specific functions BSC is the switching center for radio channels

Mobile Station Identification IMEI (International Mobile equipment identity) identify the MS In the SIM (Subscriber Identity Module) are managed: Personal Identity Number (PIN) and PIN unlocking key (PUK) International Mobile Subscriber Identity (IMSI) Mobile Country Code Mobile Network Code (e.g. the code of “Vodaphone”) Mobile Subscriber Identification Number This is the unique identifier of the subscriber – primary key in the HLR Sent rarely by the MS, only to get a TMSI Mobile station international ISDN number (MSISDN) 39 329 1119998 A SIM may have more than one MSISDN (one voice one fax) Also a primary key in HLR Temporary mobile subscriber identity (TMSI): used to hide the IMSI, it is selected by the current VLR and is only valid temporarily within the area used in the radio communication with the MS Mobile station roaming number (MSRN): generated by the VLR (stored in the HLR) for mobile terminated calls An authentication key Ki (for authentication and encryption when communicating with the BSS).

Network and switching subsystem (I) NSS is the main component of the public mobile network GSM switching, mobility management, interconnection to other networks, system control Components: MSC, HLR, VLR Mobile Switching Center (MSC) controls all connections via a separated network to/ from a mobile terminal within the domain of the MSC - several BSC can belong to a MSC Gateway MSC: determines which visited MSC the called subscriber is currently located Visited MSC: the MSC where the customer is located Anchor MSC and Target MSC: are the MSC involved in a handover.

Network and switching subsystem (II) Databases (important: scalability, high capacity, low delay) Home Location Register (HLR): central master database containing user data (one provider have one but can be distributed): GSM services the user subscribed GPRS settings of the user Current location of the subscriber (VLR and LAI local area identifier) The primary keys are the MSISDN (phone number) ( 39-328-0070077) and IMSI (subscriber number) Send subscriber data to VLR when the user roams there Visitor Location Register (VLR): local database for a subset of user data, including data about all user currently in the domain of the VLR – one VLR for each MSC.

Operation subsystem The OSS (Operation Subsystem) enables centralized operation, management, and maintenance of all GSM subsystems Components Authentication Center (AUC) generates user specific authentication parameters on request of a VLR authentication parameters used for authentication of mobile terminals and encryption of user data on the air interface within the GSM system Equipment Identity Register (EIR) registers GSM mobile stations and user rights stolen or malfunctioning mobile stations can be locked and sometimes even localized Operation and Maintenance Center (OMC) different control capabilities for the radio subsystem and the network subsystem

Authentication AUC authenticate each SIM that tries to connect to the GSM network (phone is powered on) SIM and AUC share a secret authentication key Ki (this is never transmitted) When a MSC must communicate with a MS it asks to the AUC for three numbers (for a particular IMSI) RAND is a random number SRES is obtained from an algorithm A3(Ki , RAND) Kk is obtained from an algorithm A8(Ki , RAND) The MS uses A3 to generate SRES – the MSC can authenticate the user The key Kk used for encryption of the communication (MS can generate this with A8).

Mobility Management MS detects the Location Area Code (LAC) broadcasted by the BTS A LAC is managed by a BSC (Base Station Controller) – and could be the same for 10-100 BTS When the MS notice that it has moved to another LAC informs the network, i.e., the MSC-VLR currently responsible for the new LAC, that it want to change from the old to the new The new MSC-VLR informs the old MSC-VLR that he is taking care of the MS and ask for its IMSI (he knows only the TMSI) The new MSC-VLR receives the IMSI and inform the HLR that the MS has a new location The old MSC-VLR deletes the data of the MS The new MSC-VLR may decide to authenticate the MS and then start communicating by ciphering the data.

Mobile Terminated Call 1: calling a GSM subscriber 2: forwarding call to GMSC 3: signal call setup to HLR HLR 4, 5: request MSRN (Mobile station roaming number) 3 6 from VLR calling 6: forward responsible PSTN GMSC station 1 2 MSC to GMSC 10 7: forward call to BSS current MSC 11 8, 9: get current status of MS 10, 11: paging of MS 12, 13: MS answers 14, 15: security checks and setup encryption 16, 17: set up connection 4 5 7 VLR 8 9 14 15 MSC 10 13 16 10 BSS BSS 11 11 11 12 17 MS

Mobile Originated Call 1, 2: connection request 3, 4: security check (is the user allowed to do that?) VLR 5-8: check resources (free circuit) 9-10: set up call 3 4 PSTN 6 5 GMSC 7 MSC 8 2 9 MS 1 10 BSS

Data services in GSM I Data transmission standardized with only 9.6 kbit/s advanced coding allows 14,4 kbit/s not enough for Internet and multimedia applications HSCSD (High-Speed Circuit Switched Data) mainly software update bundling of several time-slots to get higher AIUR (Air Interface User Rate) (e.g., 57.6 kbit/s using 4 slots, 14.4 each) advantage: ready to use, constant quality, simple disadvantage: channels blocked for voice transmission

GPRS - General Packet Radio Service General Packet Radio Service (GPRS) is a mobile data service available to users of GSM (2.5 G) GPRS data transfer is typically charged per megabyte of transferred data GPRS can be utilized for services such as WAP access, SMS and MMS, but also for Internet communication services such as email and web access GPRS is packet-switched - multiple users share the same transmission channel, only transmitting when they have data to send Data transfer speed ranges between 9 to 171 kbit/s (depends on slots and codec used).

GPRS user data rates in kbit/s Coding scheme 1 slot 2 slots 3 slots 4 slots 5 slots 6 slots 7 slots 8 slots CS-1 9.05 18.1 27.15 36.2 45.25 54.3 63.35 72.4 CS-2 13.4 26.8 40.2 53.6 67 80.4 93.8 107.2 CS-3 15.6 31.2 46.8 62.4 78 93.6 109.2 124.8 CS-4 21.4 42.8 64.2 85.6 107 128.4 149.8 171.2

Examples for GPRS device classes Class Receiving slots Sending slots Maximum number of slots 1 1 1 2 2 2 1 3 3 2 2 3 5 2 2 4 8 4 1 5 10 4 2 5 12 4 4 5

time GSM TDMA frame GSM time-slot (normal burst) 4.615 ms 546.5 µs 577 µs tail user data S Training guard space S user data tail guard space 3 bits 57 bits 1 26 bits 1 57 bits 3 GSM - TDMA/FDMA 148 bits in 546.5µs 156.25 bits in 577 µs . Radio interface Each .

Related Documents:

Wireless# Guide to Wireless Communications Chapter 1 Introduction to Wireless Communications . Wireless Local Area Network (WLAN) - Extension of a wired LAN Connecting to it through a device called a wireless . network Each computer on the WLAN has a wireless network interface card (NIC) - With an antenna built into it .

TRENDnet’s AC1750 Dual Band Wireless Router, model TEW-812DRU, produces the ultimate wireless experience with gigabit wireless speeds. Manage two wireless networks—the 1300 Mbps Wireless AC band for the fastest wireless available and the 450 Mbps Wireless N ba

Open Intel PROSet/Wireless Click to start Intel PROSet/Wireless when Intel PROSet/Wireless is your wireless manager. If you select Use Windows to manage Wi-Fi from the Taskbar menu, the menu option changes to Open Wireless Zero Configuration and Microsoft Windows XP Wireless Zero Configuration Service is used as your wireless manager. When

Wireless AC3200 Tri Band Gigabit Cloud Router Wireless AC3150 Ultra-WiFi Gigabit Cloud Router Wireless AC1900 Gigabit Cloud Router Wireless AC1750 Gigabit Cloud Router Wireless AC1750 High-Power Gigabit Router Wireless AC1200 Gigabit Cloud Router Wireless Technology Tri Band Wireless AC (5300

Open Intel PROSet/Wireless Click to start Intel PROSet/Wireless when Intel PROSet/Wireless is your wireless manager. If you select Use Windows to manage Wi-Fi from the Taskbar menu, the menu option changes to Open Wireless Zero Configuration and Microsoft Windows XP Wireless Zero Configuration Service is

W2E2 Wireless Women for Entrepreneurship & Empowerment W3C World Wide Web Consortium W4C Wireless for Communities WAS Wireless Access System W-CDMA Wideband Code Division Multiple Access WCN Wireless community networks Wi-Fi Wireless Fidelity WiMAX Worldwide Interoperability for Microwave Access WLAN Wireless local area network WLL Wireless in .

1992 -First UHF wireless intercom System 800. 2003 -PRO850 Synthesized UHF Wireless Intercom. 2004 -DX200 2.4 GHz Digital Wireless Intercom. 2005 -DX100 Portable Digital Wireless Intercom. 2006 -WH200 All-in-One Wireless Headset. 2007 -DX300 Two Channel Wireless Intercom System. 2008 -WS200 Wireless Speaker Station. HME CUSTOMER DRIVEN SOLUTIONS

1.4.7 AMS Wireless Configurator Software supplied with Smart Wireless Gateway for configuration of wireless devices. AMS Wireless Configurator can be used to deploy and configure wireless networks. AMS Wireless Configurator provides an in tegrated operating environment that leverages the full capabilities of WirelessHART devices, including embedded